(Dis)trust certification model for large access in a pervasive environment

The challenge of pervasive computing consists in offering access to computing services anywhere and anytime with any devices. However, before it becomes a reality, the problems of access control and authentication have to be solved, among others. Existing solutions are inadequate without adaptation to this specific environment. Among the promising approaches, the trust paradigm seems to be more flexible than others. We base this proposal on this paradigm to implement a distrust model, so‐called APC (Access Pass Certificate). The main objective of this model is to enable authorized user to roam and to access trusted sites though they are not known locally. A user can claim two kinds of APCs provided by two kinds of sites: the home site (where the user has an account) and the trusted site (that trusts the user). Using these certificates, the user can progressively extend her access scope. This model implements a decentralized mapping policy, where the correspondence between the user’s home profile and her r...

[1]  Timothy W. Finin,et al.  A Delegation Based Model for Distributed Trust , 2001 .

[2]  Lionel Brunie,et al.  Semantic Access Control for Medical Applications in Grid Environments , 2003, Euro-Par.

[3]  Stephen Hailes,et al.  A distributed trust model , 1998, NSPW '97.

[4]  Philip R. Zimmermann,et al.  The official PGP user's guide , 1996 .

[5]  Tim Kindberg,et al.  A Web-based nomadic computing system , 2001, Comput. Networks.

[6]  Ian T. Foster,et al.  A community authorization service for group collaboration , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.

[7]  Lionel Brunie,et al.  Modeling User Intention in Pervasive Service Environments , 2005, EUC.

[8]  Jianping Hu,et al.  A novel cloud-based trust model for pervasive computing , 2004, The Fourth International Conference onComputer and Information Technology, 2004. CIT '04..

[9]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[10]  Celeste Campo,et al.  PTM: A Pervasive Trust Management Model for Dynamic Open Environments ⁄ , 2003 .

[11]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[12]  Timothy W. Finin,et al.  Trust-Based Security in Pervasive Computing Environments , 2022 .

[13]  Jeffrey D. Ullman,et al.  Protection in operating systems , 1976, CACM.

[14]  Thomas Beth,et al.  Valuation of Trust in Open Networks , 1994, ESORICS.

[15]  Laurent Bussard,et al.  Trust and Authorization in Pervasive B2E Scenarios , 2003, ISC.

[16]  Ian T. Foster,et al.  Security for Grid services , 2003, High Performance Distributed Computing, 2003. Proceedings. 12th IEEE International Symposium on.

[17]  D. Elliott Bell Secure Computer Systems: A Refinement of the Mathematical Model , 1974 .

[18]  Barry Brumitt,et al.  EasyLiving: Technologies for Intelligent Environments , 2000, HUC.